| Pages: 1 2 3 [4] 5 :: one page |
| Author |
Thread Statistics | Show CCP posts - 0 post(s) |

MinorMiner
|
Posted - 2004.08.29 20:34:00 -
[91]
Originally by: Counterfeit
Originally by: Ankanos ..um, no way he could pulled off the carrier wave hack without a Flux Capacitor..

he also needs a Uridium T35 Destructive Space Modulator
No, no, that's the generic one. He needs the named one - the Illudium Q36 Explosive Space Modulator. :D
----- Help keep the galaxy clean, join TOOKURSTUFF channel and participate. Call toll-free at 1-800-GANK-ORE to schedule a pickup |

MinorMiner
|
Posted - 2004.08.29 20:34:00 -
[92]
Originally by: Counterfeit
Originally by: Ankanos ..um, no way he could pulled off the carrier wave hack without a Flux Capacitor..

he also needs a Uridium T35 Destructive Space Modulator
No, no, that's the generic one. He needs the named one - the Illudium Q36 Explosive Space Modulator. :D
----- Help keep the galaxy clean, join TOOKURSTUFF channel and participate. Call toll-free at 1-800-GANK-ORE to schedule a pickup |

Big doggy
|
Posted - 2004.09.01 00:58:00 -
[93]
Wow some great responses and good answers, how refeshing.
Thanks for the great info.
It must have been a very bizarre coincidence that my software said "trojan found and cleaned" not 5 minutes after he threatened to send me a trojan. Wierd.
Since then I've stole a very large amount of ore. HAHAhahahah |

Big doggy
|
Posted - 2004.09.01 00:58:00 -
[94]
Wow some great responses and good answers, how refeshing.
Thanks for the great info.
It must have been a very bizarre coincidence that my software said "trojan found and cleaned" not 5 minutes after he threatened to send me a trojan. Wierd.
Since then I've stole a very large amount of ore. HAHAhahahah |

GeoNoSiS
|
Posted - 2004.09.01 12:27:00 -
[95]
Originally by: Daakkon use an electromagnetic beam to counter his external carrier wave and then use a psychotoxic electromagnetic beam and defuctor his computer
i lost what i was talking about when i typed the word (if it even is a wordt) defuctor
lololololololololololol -----------------------------------------------
(\_/) (O.o) (> <) This is Bunny. Copy Bunny into your signature to help him on his way to world |

GeoNoSiS
|
Posted - 2004.09.01 12:27:00 -
[96]
Originally by: Daakkon use an electromagnetic beam to counter his external carrier wave and then use a psychotoxic electromagnetic beam and defuctor his computer
i lost what i was talking about when i typed the word (if it even is a wordt) defuctor
lololololololololololol -----------------------------------------------
(\_/) (O.o) (> <) This is Bunny. Copy Bunny into your signature to help him on his way to world |

Tok Narok
|
Posted - 2004.09.01 12:50:00 -
[97]
Originally by: c0ntinuity ...So even if a player visits a hostile page set up by an evil player, it looks like they wont get much usefull info from it...
You can capture the data using (in PHP):
$_SERVER["HTTP_EVE_CHARNAME"] $_SERVER["HTTP_EVE_CORPNAME"] $_SERVER["HTTP_EVE_SOLARSYSTEMNAME"] $_SERVER["REMOTE_ADDR"] etc...
It works, and it provides the users IP, not CCP's. (Just so you know.)
Popular deviant. |

Tok Narok
|
Posted - 2004.09.01 12:50:00 -
[98]
Originally by: c0ntinuity ...So even if a player visits a hostile page set up by an evil player, it looks like they wont get much usefull info from it...
You can capture the data using (in PHP):
$_SERVER["HTTP_EVE_CHARNAME"] $_SERVER["HTTP_EVE_CORPNAME"] $_SERVER["HTTP_EVE_SOLARSYSTEMNAME"] $_SERVER["REMOTE_ADDR"] etc...
It works, and it provides the users IP, not CCP's. (Just so you know.)
Popular deviant. |

ZoorRg
|
Posted - 2004.09.01 19:45:00 -
[99]
I firmly belive that hacking can be stoped and ur IP address can never be reveled with the use of super flux compesitor and ham and cheez... , by the way what is a computer?
|

ZoorRg
|
Posted - 2004.09.01 19:45:00 -
[100]
I firmly belive that hacking can be stoped and ur IP address can never be reveled with the use of super flux compesitor and ham and cheez... , by the way what is a computer?
|

Mean Jeebus
|
Posted - 2004.09.02 06:43:00 -
[101]
Originally by: Vicarrah Edited by: Vicarrah on 28/08/2004 00:05:01
Originally by: Dead Sexy do you have any idea of base system programming being used to travel via a secure external carrier wave?
OK, i'm feeling evil here. now I'm not the greatest guy to talk to about direct TCP/IP/UDP connections, or even know how we connect to Eve. what I am is a programmer of nearly 15 years experience, and I'd just like to to take this statement apart, piece by piece.
*c racks knuckles*
let's take the first part. "base system programming" - google search reveals absolutely feck all, unless you want to talk about "In-System Programming with 8051-Based Microcontrollers", or "C# Programming: Namespaces and the Base Classes Part 1 - Introduction". taking the phrase apart piece by piece also fails to illuminate us with any particular information.... what "base" are we talking about? we could be thinking in terms of machine code, as that is that "base" of all "system programming", but it just doesn't feel right.
technical content score - 3% (1 for each word)
second phrase. "secure external carrier wave" - this one's interesting, as it implies a non-physical approach, and for this to work, said haxxor would have to find out specific location of said haxxee, which, even if he could find out and IP address and tie that to a physical location, would be highly illegal, and probably extremely difficult for people without CIA/MI5 connections. Still, lets elaborate. fair enough, a google search lists some nice links to wifi security sites and articles. the problem comes with putting the words together... if you're ghosting onto someone's network, then its not secure is it?
technical content score 14% (4% for words, 10% for the google)
The phrase "being used to travel" is a good one as well... how can our l33t haxxor use "base system programming" "to travel via" our ghosted wifi connection (if thats even what he meant).... you can't use a programming method to communicate via a connection... the programming defines the structure of the communication, not the media.
technical content score 1%
overall technical content 4% + 14% * 1% = 4.14% from a technical point of view..... shabby to say the least. 
doncha just love it when idiots unmask themselves?
OMG!! Vicarrah, you are my hero. That was WTFS3xx0rYPWND!!!1 Word
|

Mean Jeebus
|
Posted - 2004.09.02 06:43:00 -
[102]
Originally by: Vicarrah Edited by: Vicarrah on 28/08/2004 00:05:01
Originally by: Dead Sexy do you have any idea of base system programming being used to travel via a secure external carrier wave?
OK, i'm feeling evil here. now I'm not the greatest guy to talk to about direct TCP/IP/UDP connections, or even know how we connect to Eve. what I am is a programmer of nearly 15 years experience, and I'd just like to to take this statement apart, piece by piece.
*c racks knuckles*
let's take the first part. "base system programming" - google search reveals absolutely feck all, unless you want to talk about "In-System Programming with 8051-Based Microcontrollers", or "C# Programming: Namespaces and the Base Classes Part 1 - Introduction". taking the phrase apart piece by piece also fails to illuminate us with any particular information.... what "base" are we talking about? we could be thinking in terms of machine code, as that is that "base" of all "system programming", but it just doesn't feel right.
technical content score - 3% (1 for each word)
second phrase. "secure external carrier wave" - this one's interesting, as it implies a non-physical approach, and for this to work, said haxxor would have to find out specific location of said haxxee, which, even if he could find out and IP address and tie that to a physical location, would be highly illegal, and probably extremely difficult for people without CIA/MI5 connections. Still, lets elaborate. fair enough, a google search lists some nice links to wifi security sites and articles. the problem comes with putting the words together... if you're ghosting onto someone's network, then its not secure is it?
technical content score 14% (4% for words, 10% for the google)
The phrase "being used to travel" is a good one as well... how can our l33t haxxor use "base system programming" "to travel via" our ghosted wifi connection (if thats even what he meant).... you can't use a programming method to communicate via a connection... the programming defines the structure of the communication, not the media.
technical content score 1%
overall technical content 4% + 14% * 1% = 4.14% from a technical point of view..... shabby to say the least. 
doncha just love it when idiots unmask themselves?
OMG!! Vicarrah, you are my hero. That was WTFS3xx0rYPWND!!!1 Word
|

khainestar
|
Posted - 2004.09.02 15:13:00 -
[103]
Quote: You can capture the data using (in PHP):
$_SERVER["HTTP_EVE_CHARNAME"] $_SERVER["HTTP_EVE_CORPNAME"] $_SERVER["HTTP_EVE_SOLARSYSTEMNAME"]
$_SERVER["REMOTE_ADDR"] etc...
It works, and it provides the users IP, not CCP's. (Just so you know.)
But you have to trust the site so its no big deal really.
Also if you are behind a router with a firewall you are more than likely using NAT so your internal IP address can't be hit from the internet and your firewall will either register an attempt to log in against it or a scan attempt. Either way it should stop it coming in.
Quote: he also needs a Uridium T35 Destructive Space Modulator
Your showing your age if you know where that one comes from. 
-----------------------------------------------------
Pain. Looks great on other people. Its what there for. |

khainestar
|
Posted - 2004.09.02 15:13:00 -
[104]
Quote: You can capture the data using (in PHP):
$_SERVER["HTTP_EVE_CHARNAME"] $_SERVER["HTTP_EVE_CORPNAME"] $_SERVER["HTTP_EVE_SOLARSYSTEMNAME"]
$_SERVER["REMOTE_ADDR"] etc...
It works, and it provides the users IP, not CCP's. (Just so you know.)
But you have to trust the site so its no big deal really.
Also if you are behind a router with a firewall you are more than likely using NAT so your internal IP address can't be hit from the internet and your firewall will either register an attempt to log in against it or a scan attempt. Either way it should stop it coming in.
Quote: he also needs a Uridium T35 Destructive Space Modulator
Your showing your age if you know where that one comes from. 
-----------------------------------------------------
Pain. Looks great on other people. Its what there for. |

Ramar Togal
|
Posted - 2004.09.02 16:45:00 -
[105]
Edited by: Ramar Togal on 02/09/2004 16:53:52
Originally by: MinorMiner
Originally by: Counterfeit
Originally by: Ankanos ..um, no way he could pulled off the carrier wave hack without a Flux Capacitor..

he also needs a Uridium T35 Destructive Space Modulator
No, no, that's the generic one. He needs the named one - the Illudium Q36 Explosive Space Modulator. :D
--------------
It's An Illudium Pew-36 Explosive Space Modulator 
|

Ramar Togal
|
Posted - 2004.09.02 16:45:00 -
[106]
Edited by: Ramar Togal on 02/09/2004 16:53:52
Originally by: MinorMiner
Originally by: Counterfeit
Originally by: Ankanos ..um, no way he could pulled off the carrier wave hack without a Flux Capacitor..

he also needs a Uridium T35 Destructive Space Modulator
No, no, that's the generic one. He needs the named one - the Illudium Q36 Explosive Space Modulator. :D
--------------
It's An Illudium Pew-36 Explosive Space Modulator 
|

Haitchi Allamut
|
Posted - 2004.09.02 18:47:00 -
[107]
Get your ultimate carrierwave protection here almost for free Linkage
|

Haitchi Allamut
|
Posted - 2004.09.02 18:47:00 -
[108]
Get your ultimate carrierwave protection here almost for free Linkage
|

Asuri Lee
|
Posted - 2004.09.02 20:20:00 -
[109]
Originally by: Tok Narok
You can capture the data using (in PHP):
$_SERVER["HTTP_EVE_CHARNAME"] $_SERVER["HTTP_EVE_CORPNAME"] $_SERVER["HTTP_EVE_SOLARSYSTEMNAME"] $_SERVER["REMOTE_ADDR"] etc...
It works, and it provides the users IP, not CCP's. (Just so you know.)
This would make sense. You can send arbitrary headers in the GET HTTP request, and unless CCP want to perform NAT across 10,000+ connected players (NOT fun) and live with the bandwidth, the browser would indeed operate client <-> site.
I do not understand why Eve would want to open a port to listen on. If you are behind a NAT filter (sensible) you would have to forward this port to have it do anything. And I don't remember that being a prerequisite for gameplay...
There is no way another player can obtain your IP address without accessing CCP's servers.
Can we leave this discussion to die now? 
|

Asuri Lee
|
Posted - 2004.09.02 20:20:00 -
[110]
Originally by: Tok Narok
You can capture the data using (in PHP):
$_SERVER["HTTP_EVE_CHARNAME"] $_SERVER["HTTP_EVE_CORPNAME"] $_SERVER["HTTP_EVE_SOLARSYSTEMNAME"] $_SERVER["REMOTE_ADDR"] etc...
It works, and it provides the users IP, not CCP's. (Just so you know.)
This would make sense. You can send arbitrary headers in the GET HTTP request, and unless CCP want to perform NAT across 10,000+ connected players (NOT fun) and live with the bandwidth, the browser would indeed operate client <-> site.
I do not understand why Eve would want to open a port to listen on. If you are behind a NAT filter (sensible) you would have to forward this port to have it do anything. And I don't remember that being a prerequisite for gameplay...
There is no way another player can obtain your IP address without accessing CCP's servers.
Can we leave this discussion to die now? 
|

Origim
|
Posted - 2004.09.02 20:25:00 -
[111]
Edited by: Origim on 02/09/2004 20:27:30
--------------
Posting Efficiency / Rank 1 / SP: 68542 of 256000 | 
|

Origim
|
Posted - 2004.09.02 20:25:00 -
[112]
Edited by: Origim on 02/09/2004 20:27:30
--------------
Posting Efficiency / Rank 1 / SP: 68542 of 256000 | 
|

Mi Canio
|
Posted - 2004.09.02 20:32:00 -
[113]
Im sure that base level programming by secure external carrier wave is what they use in The Matrix to travel in and out of the Matrix....
Although i could be mistaken...
either way he's a fking n00b for even suggesting it... Ensign Mi Canio - MIL Div. - Combat Air Patrol
|

Mi Canio
|
Posted - 2004.09.02 20:32:00 -
[114]
Im sure that base level programming by secure external carrier wave is what they use in The Matrix to travel in and out of the Matrix....
Although i could be mistaken...
either way he's a fking n00b for even suggesting it... Ensign Mi Canio - MIL Div. - Combat Air Patrol
|

Jerec Deepblue
|
Posted - 2004.09.03 18:12:00 -
[115]
$_SERVER["HTTP_EVE_CHARNAME"] $_SERVER["HTTP_EVE_CORPNAME"] $_SERVER["HTTP_EVE_SOLARSYSTEMNAME"] $_SERVER["REMOTE_ADDR"] etc...
What? So you are saying THERE IS a way to get a players IP address while he's playing this game? That would/could be a very serious thing. Being an Ultra-nooblar when it comes to the Wonderful World of the Internet, I have no idea. But I'd like to know. Thanks |

Jerec Deepblue
|
Posted - 2004.09.03 18:12:00 -
[116]
$_SERVER["HTTP_EVE_CHARNAME"] $_SERVER["HTTP_EVE_CORPNAME"] $_SERVER["HTTP_EVE_SOLARSYSTEMNAME"] $_SERVER["REMOTE_ADDR"] etc...
What? So you are saying THERE IS a way to get a players IP address while he's playing this game? That would/could be a very serious thing. Being an Ultra-nooblar when it comes to the Wonderful World of the Internet, I have no idea. But I'd like to know. Thanks |

Shenro
|
Posted - 2004.09.04 01:52:00 -
[117]
he/she is just a lier a smacktalking little pansy ass****ity ***** who wants to try and act big. trust me nothing like that will happen. i used to play starcraft alot and after i kicked one guys ass he said he was going to hack my computer, very few people that say they can hack cant really hack, most people that say they can hack are liers so dont believe them they are all *** smacktalking sissies (normally 12 years old)
2005.04.05 19:01:31 combat Your Medium Pulse Laser II perfectly strikes Brothel, wrecking for 260.3 damage.
|

Shenro
|
Posted - 2004.09.04 01:52:00 -
[118]
he/she is just a lier a smacktalking little pansy ass****ity ***** who wants to try and act big. trust me nothing like that will happen. i used to play starcraft alot and after i kicked one guys ass he said he was going to hack my computer, very few people that say they can hack cant really hack, most people that say they can hack are liers so dont believe them they are all *** smacktalking sissies (normally 12 years old)
2005.04.05 19:01:31 combat Your Medium Pulse Laser II perfectly strikes Brothel, wrecking for 260.3 damage.
|

Inanna Sumer
|
Posted - 2004.09.04 02:55:00 -
[119]
Originally by: Jerec Deepblue
$_SERVER["HTTP_EVE_CHARNAME"] $_SERVER["HTTP_EVE_CORPNAME"] $_SERVER["HTTP_EVE_SOLARSYSTEMNAME"] $_SERVER["REMOTE_ADDR"] etc...
What? So you are saying THERE IS a way to get a players IP address while he's playing this game? That would/could be a very serious thing. Being an Ultra-nooblar when it comes to the Wonderful World of the Internet, I have no idea. But I'd like to know. Thanks
only if you use the in game browser to visit a website- they don't get the char info (unless you've designated the site as trusted) though.
|

Inanna Sumer
|
Posted - 2004.09.04 02:55:00 -
[120]
Originally by: Jerec Deepblue
$_SERVER["HTTP_EVE_CHARNAME"] $_SERVER["HTTP_EVE_CORPNAME"] $_SERVER["HTTP_EVE_SOLARSYSTEMNAME"] $_SERVER["REMOTE_ADDR"] etc...
What? So you are saying THERE IS a way to get a players IP address while he's playing this game? That would/could be a very serious thing. Being an Ultra-nooblar when it comes to the Wonderful World of the Internet, I have no idea. But I'd like to know. Thanks
only if you use the in game browser to visit a website- they don't get the char info (unless you've designated the site as trusted) though.
|
| |
|
| Pages: 1 2 3 [4] 5 :: one page |
| First page | Previous page | Next page | Last page |